Analysis

  • max time kernel
    294s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17-01-2025 01:45

General

  • Target

    Documt736098.vbe

  • Size

    9KB

  • MD5

    8113e63e2ba4ac63a4621b2d9441524d

  • SHA1

    05b433f2cfb14f9d1ec947e32a496c45a2cfa22a

  • SHA256

    d5d3a7f4ca9b374465da72f550cc5a04e751c6a4ed18ab917a304318a9b4409b

  • SHA512

    730e21b73e6320146c53dd9092246578a476b24efb6dbcd902e905df05039274cd2adf76293e54e1d9a3cb01e88d3800db867597bbffd979ecfea5729d4d62d9

  • SSDEEP

    192:egjmLPbnOqiR2jutyT8vPka6hfuIMynp9KAvPxK:tjcPbg2+yT8HkaTTqp0AvQ

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Drops file in System32 directory 20 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 40 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Documt736098.vbe"
    1⤵
    • Blocklisted process makes network request
    PID:2108
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {2DDC2231-D99C-4E53-A140-E2EBAADEA97E} S-1-5-21-312935884-697965778-3955649944-1000:MXQFNXLT\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2528
    • C:\Windows\System32\WScript.exe
      C:\Windows\System32\WScript.exe "C:\Users\Admin\AppData\Roaming\TJtBPNdaqSLLBQi.vbs"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1224
      • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
        3⤵
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2760
        • C:\Windows\system32\wermgr.exe
          "C:\Windows\system32\wermgr.exe" "-outproc" "2760" "1248"
          4⤵
            PID:2864
        • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
          3⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2672
          • C:\Windows\system32\wermgr.exe
            "C:\Windows\system32\wermgr.exe" "-outproc" "2672" "1248"
            4⤵
              PID:1652
          • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
            3⤵
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1048
            • C:\Windows\system32\wermgr.exe
              "C:\Windows\system32\wermgr.exe" "-outproc" "1048" "1240"
              4⤵
                PID:1744
            • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
              3⤵
              • Drops file in System32 directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1768
              • C:\Windows\system32\wermgr.exe
                "C:\Windows\system32\wermgr.exe" "-outproc" "1768" "1252"
                4⤵
                  PID:2352
              • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                3⤵
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:648
                • C:\Windows\system32\wermgr.exe
                  "C:\Windows\system32\wermgr.exe" "-outproc" "648" "1240"
                  4⤵
                    PID:1324
                • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                  3⤵
                  • Drops file in System32 directory
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1284
                  • C:\Windows\system32\wermgr.exe
                    "C:\Windows\system32\wermgr.exe" "-outproc" "1284" "1248"
                    4⤵
                      PID:864
                  • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                    3⤵
                    • Drops file in System32 directory
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:1004
                    • C:\Windows\system32\wermgr.exe
                      "C:\Windows\system32\wermgr.exe" "-outproc" "1004" "1244"
                      4⤵
                        PID:2236
                    • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                      3⤵
                      • Drops file in System32 directory
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:2340
                      • C:\Windows\system32\wermgr.exe
                        "C:\Windows\system32\wermgr.exe" "-outproc" "2340" "1248"
                        4⤵
                          PID:2688
                      • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                        3⤵
                        • Drops file in System32 directory
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:2792
                        • C:\Windows\system32\wermgr.exe
                          "C:\Windows\system32\wermgr.exe" "-outproc" "2792" "1240"
                          4⤵
                            PID:1112
                        • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                          3⤵
                          • Drops file in System32 directory
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:2036
                          • C:\Windows\system32\wermgr.exe
                            "C:\Windows\system32\wermgr.exe" "-outproc" "2036" "1248"
                            4⤵
                              PID:1704
                          • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                            "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                            3⤵
                            • Drops file in System32 directory
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:700
                            • C:\Windows\system32\wermgr.exe
                              "C:\Windows\system32\wermgr.exe" "-outproc" "700" "1244"
                              4⤵
                                PID:2412
                            • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                              "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                              3⤵
                              • Drops file in System32 directory
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1644
                              • C:\Windows\system32\wermgr.exe
                                "C:\Windows\system32\wermgr.exe" "-outproc" "1644" "1232"
                                4⤵
                                  PID:716
                              • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                                3⤵
                                • Drops file in System32 directory
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2996
                                • C:\Windows\system32\wermgr.exe
                                  "C:\Windows\system32\wermgr.exe" "-outproc" "2996" "1240"
                                  4⤵
                                    PID:2680
                                • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                  "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                                  3⤵
                                  • Drops file in System32 directory
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2420
                                  • C:\Windows\system32\wermgr.exe
                                    "C:\Windows\system32\wermgr.exe" "-outproc" "2420" "1244"
                                    4⤵
                                      PID:2572
                                  • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                    "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                                    3⤵
                                    • Drops file in System32 directory
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2112
                                    • C:\Windows\system32\wermgr.exe
                                      "C:\Windows\system32\wermgr.exe" "-outproc" "2112" "1240"
                                      4⤵
                                        PID:1004
                                    • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                      "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                                      3⤵
                                      • Drops file in System32 directory
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2756
                                      • C:\Windows\system32\wermgr.exe
                                        "C:\Windows\system32\wermgr.exe" "-outproc" "2756" "1252"
                                        4⤵
                                          PID:1912
                                      • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                        "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                                        3⤵
                                        • Drops file in System32 directory
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2596
                                        • C:\Windows\system32\wermgr.exe
                                          "C:\Windows\system32\wermgr.exe" "-outproc" "2596" "1240"
                                          4⤵
                                            PID:2084
                                        • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                          "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                                          3⤵
                                          • Drops file in System32 directory
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:2724
                                          • C:\Windows\system32\wermgr.exe
                                            "C:\Windows\system32\wermgr.exe" "-outproc" "2724" "1240"
                                            4⤵
                                              PID:2700
                                          • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                            "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                                            3⤵
                                            • Drops file in System32 directory
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:2904
                                            • C:\Windows\system32\wermgr.exe
                                              "C:\Windows\system32\wermgr.exe" "-outproc" "2904" "1240"
                                              4⤵
                                                PID:2128
                                            • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                              "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                                              3⤵
                                              • Drops file in System32 directory
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:2560
                                              • C:\Windows\system32\wermgr.exe
                                                "C:\Windows\system32\wermgr.exe" "-outproc" "2560" "1252"
                                                4⤵
                                                  PID:1536

                                          Network

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259444319.txt

                                            Filesize

                                            1KB

                                            MD5

                                            ef2cacab9ad5fc0422a5229e9ef9e9e1

                                            SHA1

                                            1786594fe2f8252f4e9790c6573457b0815a037a

                                            SHA256

                                            9102d123a84dc2e1289b91e347df82654233eeeea6e54a3a5d29b56f723fea0b

                                            SHA512

                                            1d79350115c2f88e14d0a93b4164d78d068f16f0311f9ba8ba78d65c0eb9e387873ba98838c0b665148dfe675f85cad4c8c1adf0a5f708a861173e14217445d9

                                          • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259454229.txt

                                            Filesize

                                            1KB

                                            MD5

                                            fab30906f29896adb821f688a8cf1a85

                                            SHA1

                                            303153138b445ad77d655413c81ac923bbeb6e85

                                            SHA256

                                            02d499de4e65628e64966417054f9654d108b3b8c5888a0b72b667e6488c7055

                                            SHA512

                                            8cfae6542d1eb987c9c407e0b98a4abc4d9f716dbc763dab3e66dc0713f1f3df606e98c8a983a56b4135a2ea153c2cc5df3ea3db76964fc547bf2c166c5bd3a7

                                          • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259473018.txt

                                            Filesize

                                            1KB

                                            MD5

                                            7de735c9beb61e1849004cb274ca8ff3

                                            SHA1

                                            2ec7a5e65f794d969d139ab02ac0c61013d7196c

                                            SHA256

                                            599d667d48d860bcf75354d895d36e5b5e8ca10821cc442253e36ec044777334

                                            SHA512

                                            1ff3c22c395796b3af2510e62c3e5dd0d81fb24fbd76508dd2190e2b9b60ce95d834e6211a140d6740bea2656d1909d13fb056f48ceca8b490bb4f7f6d56a660

                                          • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259486647.txt

                                            Filesize

                                            1KB

                                            MD5

                                            c409cc66bb763548b07c62b281c5fe0a

                                            SHA1

                                            3fc153ff6e4a1c40bd7eab005ea6483566a0e035

                                            SHA256

                                            e16f572302b4ac56841ab26660a23aac9a92cac768d85d554988c93d60b3ba68

                                            SHA512

                                            eb4d852d820add3e26b1dee77e97d14e3a76c574f520e8d8fb210b6bf1c399474fa4b96a61890af9c150a93e88b375347e56c853cfcd84402284e19247e27413

                                          • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259502625.txt

                                            Filesize

                                            1KB

                                            MD5

                                            1bb9368c012677ac5e2cdc6566ba85e6

                                            SHA1

                                            a13c3d1fa9ac48c0e0ec392a7fa4c606f837b91d

                                            SHA256

                                            a393d6d0a9632425e73295b1c2029fa8c0ee6410c51e8eca428445baaea427c7

                                            SHA512

                                            d4f51e42ef05cbe8b2db3cea964e50fbc9ec8e8e2dc56a16db830cdf39a40e5d7589ed959465acf2c9106a5e6c4bd3de091a3d45dd87f615cf76eb4bf05653be

                                          • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259518161.txt

                                            Filesize

                                            1KB

                                            MD5

                                            8236b751e57f5a8c57849d582bb2534f

                                            SHA1

                                            82b64ba5c2b1d0c4166b3c68f044429be39d4397

                                            SHA256

                                            b1e918541ad65c72cae604ba63308e78073a25d3dc17bbb9012cbf32cceadc25

                                            SHA512

                                            718f7591595de3e59d5b042d454964cc9ef3d1bee9dba8820ca3935bcb7134ece3d97e0fc43e56c53aededea928ce6f8208e7ef9e5f525f292fc8e6b834c44f6

                                          • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259532127.txt

                                            Filesize

                                            1KB

                                            MD5

                                            b5acc59847e8044a43078b3f35f3e121

                                            SHA1

                                            9b533df38db9f17c76fb7fa03b18cac4e15ae847

                                            SHA256

                                            d230a9ddbc10d4108b843181463f0bdb0dc9d9c5e5978c008b5ec5c8919edb21

                                            SHA512

                                            f3e67990861df1c0c81a7c5836bf0e4eed6e628eecf1283258bc72b7271e6affa8316af0be0c45d5556c950f40c5788d28843c3b5a2fbfbd32c70cf0754c93de

                                          • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259549365.txt

                                            Filesize

                                            1KB

                                            MD5

                                            61f2280e98cc5417470cbe49681a1cbc

                                            SHA1

                                            5a9fad46d36fb03275ef0edaccdbf189d2d8f10d

                                            SHA256

                                            d53b672d241df81a59c7acafe248d96fa1fedbeade6305fc4961d72063555a45

                                            SHA512

                                            9f768a69a6d25a7ded3cef4cec331fc1859c48799b8c8dcb5e66f8d33299bb7b464f6fbf5ebc785872ad5a26705283a5858b04a6c2d8b41a34317a01265d9f4d

                                          • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259561409.txt

                                            Filesize

                                            1KB

                                            MD5

                                            c40bfc525adaaa431c5cb9674a9abc36

                                            SHA1

                                            427843b697ee2a2d07bb9f6810633554efa56a36

                                            SHA256

                                            2f420f7cc2ccf6ada916d2faffd564c2a305df0b14c471830c4379cebb3254c3

                                            SHA512

                                            3a410a241aa5b39e3d4bc73ee2c83ebc81db1d70b3a524b5e5d15f0c7903b839a839c744fdedf0c8fe9172cdae4eb1eaefb8d5fb3bdab16e0833664a6e3fcd69

                                          • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259575918.txt

                                            Filesize

                                            1KB

                                            MD5

                                            d9274fcc55747702ec6626f7637e930e

                                            SHA1

                                            97fa49770353684601b5e7e6b338ee264159aa7f

                                            SHA256

                                            a6cfdc66ec382687c475726563098ec5ddebf946d1b32b25c94ce1520c026370

                                            SHA512

                                            bdafdfedea3dd0603620a2dbfdd69e83c7e260af2297182c01db7098c236d2e66e896febf613b63f6c4e7140e42142d35068d30dc94bfe2b3586ab647e42a4e0

                                          • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259592281.txt

                                            Filesize

                                            1KB

                                            MD5

                                            92e3363d880d3e244309d31f3f834a80

                                            SHA1

                                            2a33c9ffbc1061be919064868277b1f4e14e5f51

                                            SHA256

                                            d08ab69e7a4939c3693dda7a3fda28561d14211d85f33b30adaf5c8b10d71b08

                                            SHA512

                                            f175190c44f68d391f79f12015bf4cd37eeb5777b6e9228c95a9364564f3bd343b5d8c7836621d748853eb6287b0d2cf879dbeffecf0f79a66505067d8b86951

                                          • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259607544.txt

                                            Filesize

                                            1KB

                                            MD5

                                            0aeba9583cff4be7263c5d9297d05043

                                            SHA1

                                            ce631f6f0e85196d5e7f3662397912d67f4eb587

                                            SHA256

                                            1a4cb3e8dd1c4387fdbd32fba5f8377bd30764f9dad2db9b5cf13c9cc74d1028

                                            SHA512

                                            a2f671c09697fd218f78bf4e00f4366fd0529bd57ce6f16a00237f0a667c42c826db14ec60d8e16ec41d23f9a31d06e3cd4836022ee4b95034da27712f0ed8f6

                                          • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259621755.txt

                                            Filesize

                                            1KB

                                            MD5

                                            e8620811d4e1be2816e5d0c72548eb65

                                            SHA1

                                            7bc053ecb5dbaa291643ad0f1d06ef88dfb89138

                                            SHA256

                                            ac430b3d205e707ef9570ae830b7224e9acf23930c74da1b9e78ba521368a251

                                            SHA512

                                            355e8b059bfea59667aa566830bb1cdabc4e9ea24f666913cd0fa882b09f0351294e0538befb9e43444ba3bb78fe8274a787d5fe92e4d62746449084f548d307

                                          • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259640041.txt

                                            Filesize

                                            1KB

                                            MD5

                                            df5f63da2e8a21053763b87de22aa994

                                            SHA1

                                            95a2d135759b813dc5e1a8ef7eaafbd5994f37f9

                                            SHA256

                                            da51c36bca3a7552ca1773cf0d97779539cb700387ce3b48a549c19a0cd9deca

                                            SHA512

                                            4585f4bd524cf94cfd1e3b8551797c1210219e7ccf65bc02e3ddebc1785dddfffb8d10cd0f47d138952d1a8288021f9a9b56d105e03ccf4da263ebb146012df9

                                          • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259651321.txt

                                            Filesize

                                            1KB

                                            MD5

                                            0e6f35a05afb53f0ad81fb4fe10ad5fe

                                            SHA1

                                            4aa749bf02b199e251b85cbf983bd4b0fd43fff8

                                            SHA256

                                            3097bfc84fd7d128513a07ba55b3747d927353de292188738a8933373700310f

                                            SHA512

                                            027a6f2e4a36292fef0da2c26731d36251e3c9c4a747cf30ba0e48e0889f8cbba3b2f7b94d2535edf97a8689961d1d27867657e7b48c0172801e4f8284686f29

                                          • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259666829.txt

                                            Filesize

                                            1KB

                                            MD5

                                            998275a7a7e40373a40a3d2a90f065b3

                                            SHA1

                                            84f0766cbd22c4107f84a5065a6ca4e6fb355b92

                                            SHA256

                                            bc0522ad4e87df947cd5e142e707b4e1d89e066f99ca0655c86023d95d15b804

                                            SHA512

                                            b900f75940c725e8ea8612fc6c185cb0ca72c1a262b28a1b440e0e48dcf81f889bb1f8ff7898ac933ca57cf13bb148fe6e440ea1b30a6d44ad94c7941087cb82

                                          • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259686086.txt

                                            Filesize

                                            1KB

                                            MD5

                                            3402dc066e970fceebea89e5d00727ec

                                            SHA1

                                            a06cc6cff4c1e123368b9ab93aa7ea14c03ccb90

                                            SHA256

                                            2474b065131a2580e059b4284e596869c347f65c05cc09a8d3a38fb74cdb16d2

                                            SHA512

                                            b97012e83652ff5b23863769f053a275d24299c29e973583be18d9e319b4cde5d8222eb97bfeee8d7c99b5ab1c51041be4479c3dad89aa3a416de023ffd7895a

                                          • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259701496.txt

                                            Filesize

                                            1KB

                                            MD5

                                            65dc6db3374087aab20cace644fca05c

                                            SHA1

                                            538ad905fddee1a723aa34e9e9a8239593ae07a9

                                            SHA256

                                            2224935c3ae287f2f52bd0abeaa9bc0637946b7051cf1da409cfb5e542106165

                                            SHA512

                                            bb2fb290503fe93313660f1276017509a7199f6d7e9d6d58613fa0c682011836feeff7c274065bdbb70481b5e04a5db20ace1bffb6582e65dcf02206ed6102d5

                                          • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259711008.txt

                                            Filesize

                                            1KB

                                            MD5

                                            9cf6a446213933c7b02479d07bc3e4a6

                                            SHA1

                                            a5378ecfe92935fcf6e06bb2816ff9da6d7dae05

                                            SHA256

                                            da9a8854884e767447e3499e90a7f36a6ff0d6c44b7226604642245bc52586c8

                                            SHA512

                                            210dc687e1f213444dc3c5f222792ef9f49476500044a54085955cd7e26e1d6ab82146ec4804da0c3ad1dec6c09859c32bb0cae196896661f4d84e1989c093c7

                                          • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259730486.txt

                                            Filesize

                                            1KB

                                            MD5

                                            05c0b1f8d2e804e8016b39bc8ea2e2b7

                                            SHA1

                                            750156cfba78fa2c0efbd65d74e69737e5b84b4d

                                            SHA256

                                            fd9a4980fa5c4ff879fa5e12241e02695e3d8342bef7630f74779b82d301e995

                                            SHA512

                                            79598348104d8fe0f61de55c2d1ba262a97820894a66a9219a7f9e3ba5b4f8f5ba54d349798fe3dd6182d1812ca5144740e71dffae7805e14e0e4a69ef5d76ff

                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\1GKA0CEY4GOWRWGE4W0Z.temp

                                            Filesize

                                            7KB

                                            MD5

                                            7c0cbc0686d7f45ce9293c17ff9300b1

                                            SHA1

                                            3745db3957e5d81574303bfce1413a9480517342

                                            SHA256

                                            c5a34609555ece0fee221819dd02798b19f884598c30c4a1e17379eb4658fa68

                                            SHA512

                                            dcb9916f36a959f47ad0e5c6f05108cadb7002860527a536e2e8195e7be0f1be4841102457cdde0179e63f558828aae2406ad7c17c5353fd8c9a2a7aaacabc8c

                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                            Filesize

                                            7KB

                                            MD5

                                            2a029fc08758792e56766e70632769a3

                                            SHA1

                                            49237a7773fcd7eccf871bc59c224f9e2d2dd96a

                                            SHA256

                                            144ed97a1476231657467706294dbe12c74f6b9b0e4c5d08a5928e708acc5201

                                            SHA512

                                            4f90527240b2bff3b9a827545b909eeca16555cf8726c3c24c3d9eb459dfec920e04ebc9f6ce0823811dcb6b68b5c7f1c3b4cc1411fd432782f19ad0cb559d15

                                          • C:\Users\Admin\AppData\Roaming\TJtBPNdaqSLLBQi.vbs

                                            Filesize

                                            2KB

                                            MD5

                                            78fdde7d507d9d64ddd3808c52231caa

                                            SHA1

                                            cd989a13a2f92c404ddd56f9b9126e529b091f74

                                            SHA256

                                            0c26896cb8ca3eaa7e009abac4eff302f5a8fd312f987a2d802bdf4d67c0fd0a

                                            SHA512

                                            d77b609a544ee038e2673201d756b2a8f486a288ca0df10d1161f1516982405a7ed075c84b16d4f3ff1bde7a8ee21797e51df6e576e7ea0b85ae9835f534321a

                                          • memory/2672-18-0x00000000027E0000-0x00000000027E8000-memory.dmp

                                            Filesize

                                            32KB

                                          • memory/2672-17-0x000000001B6D0000-0x000000001B9B2000-memory.dmp

                                            Filesize

                                            2.9MB

                                          • memory/2760-6-0x000000001B680000-0x000000001B962000-memory.dmp

                                            Filesize

                                            2.9MB

                                          • memory/2760-7-0x0000000001D90000-0x0000000001D98000-memory.dmp

                                            Filesize

                                            32KB

                                          • memory/2760-8-0x0000000002900000-0x0000000002908000-memory.dmp

                                            Filesize

                                            32KB